HexHive / EPOXYLinks
Root Repo for the EPOXY tool that applies Privilege Overlays on bare-metal systems
☆33Updated 8 years ago
Alternatives and similar repositories for EPOXY
Users that are interested in EPOXY are comparing it to the libraries listed below
Sorting:
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 6 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 6 years ago
- ☆65Updated 4 years ago
- Test case minimizer for afl-fuzz☆26Updated 8 years ago
- ☆55Updated 3 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- run AFL with pintool☆66Updated 5 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆82Updated last year
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆69Updated 11 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Updated 12 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 4 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 8 years ago
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- ☆38Updated 5 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆59Updated 6 years ago
- Mozilla fork of the American Fuzzy Lop repo☆46Updated 6 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- ☆28Updated 3 years ago
- CRETE under development☆59Updated 5 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆77Updated 5 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Updated 7 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- Tools built using Dyninst or Dyninst component libraries.☆25Updated 2 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆46Updated 9 years ago